Full screen

Share

start
A brief guide of basics knowledge about hacking
Hacking
Want to create interactive content? It’s easy in Genially!

Hacking is considered by most as a taboo, negative activity but it actually originally started as something positive, creative, and innovative. This Genially is provides important topics and displays some information about them.

Transcript

start
A brief guide of basics knowledge about hacking

Hacking

Resources
Relation to Cybersecurity
Ethical vs Unethical
Black hat
Grey Hat
White Hat
History
Introduction
Topics

Index

A "hacker" does not always imply "bad" or "criminal". A hacker is simply someone who modifies computer security systems for the benefit of an organisation or for personal gain. We utilise ancient spaghetti western film names as analogies to categorise these hackers and their various hacking intents and motivations: 'White hat' - usually worn by heroes, 'Black hat' - usually worn by villains, and 'Grey hat' - something in the between.

Intoduction to Hacking with Attendence Artifact

Introduction

  • The history of hacking can be traced back to the early days of computing, when computer enthusiasts began to explore the limits of the machines they were using. In the 1960s, the term "hacker" was used to describe people who were passionate about computers and who enjoyed experimenting with them.
  • In the 1970s, the ARPANET, the precursor to the Internet, was developed by the US Department of Defense. The ARPANET was a network of computers that allowed researchers to share data and communicate with each other.
  • In the 1980s, the personal computer revolution began. This made computers more accessible to people outside of the academic and research communities. As a result, the number of hackers increased dramatically
  • In the 1990s, the Internet became widely available to the public. This led to a surge in hacking activity. Hackers began to target websites, email accounts, and other online resources. Some hackers were motivated by financial gain, while others were motivated by the challenge of breaking into secure systems.
  • n the 21st century, hacking has become even more sophisticated and widespread. Hackers are now able to exploit vulnerabilities in complex systems such as cloud computing platforms and mobile devices. Hackers are also using new technologies such as artificial intelligence and machine learning to develop new and more effective attack methods.
  • Today, hacking is a serious threat to businesses and individuals alike. Hackers can steal data, disrupt operations, and even cause physical damage. However, there are a number of steps that can be taken to protect against hacking, such as implementing strong security measures and educating employees about cybersecurity best practices.
A brief history about hacking

History of Hacking

Is it that hard to believe? Hacking for good? That is exactly what White hat hackers are. White hat hackers aka ‘ethical hackers’ are given legal permission, often for a payable fee, to test a company’s computer security system and find vulnerabilities that can potentially cause security to be comprised by malicious hackers. They conduct vulnerability assessment and penetration testing to secure the organization’s computer systems.

The Legit Ones

White Hat Hacker

Similar to life, we often see that not everything is black or white, some may fall into a grey area. Grey hat hackers may try to compromise an organization’s computer system without permission, reporting the findings back to them as asking for permission to fix them for a fee. Grey hat hackers do not have intentions as malicious as Black hat hackers but are simply trying to gain something for their own findings

Are they the legit ones?

Grey Hat Hacker

Black hat hackers are ultimately what stereotypical meanings of hackers stand for. This malicious category of hackers supports criminal acts through their hacking skills. They illegally attack computer systems, gain access to sensitive information, steal data, and corrupt documents for personal gains, typically for large amounts of ransom. These criminals/thieves are responsible for creating malware to break into systems of organizations.

The Bad Guys

Black Hat Hacker

Ethical hacking is the practice of using hacking techniques to identify and fix security vulnerabilities in computer systems and networks. Ethical hackers are authorized by the system owner to perform these tests, and they follow a strict code of ethics to ensure that their actions do not harm the system or its users.

  • Ethical hacking is legal and authorized, while unethical hacking is illegal and unauthorized.
  • Ethical hackers aim to improve security by identifying and fixing vulnerabilities, while unethical hackers aim to exploit vulnerabilities for malicious purposes.
  • Ethical hackers follow a strict code of ethics, while unethical hackers do not.
Unethical hacking, also known as black hat hacking, is the unauthorized intrusion into computer systems and networks for malicious purposes. Unethical hackers may exploit security vulnerabilities to steal data, install malware, or disrupt operations.
  • Financial losses
  • Data breaches
  • Malware infections

The Bad Guys

Ethical vs Unethical Hacking

Hacking and cybersecurity have a complex and constantly evolving relationship. On the one hand, hacking can be seen as a threat to cybersecurity, as malicious hackers can exploit security vulnerabilities to steal data, install malware, or disrupt operations. On the other hand, ethical hacking can be seen as a tool for improving cybersecurity, as it can help organizations to identify and fix security vulnerabilities before they can be exploited by malicious actors.

  • Hacking can be used to identify security vulnerabilities. Ethical hackers use the same tools and techniques as malicious hackers to find security vulnerabilities in computer systems and networks. This information can then be used by organizations to fix the vulnerabilities and improve their security posture.
  • Hacking can be used to test the effectiveness of security controls. Ethical hackers can simulate real-world attacks against an organization's systems and networks to test the effectiveness of its security controls. This information can then be used by the organization to improve its security posture.
  • Hacking can be used to raise awareness of cybersecurity risks. Ethical hackers can help to raise awareness of cybersecurity risks among employees and other stakeholders. This can help to reduce the likelihood of human error, which is a common cause of cybersecurity breaches.

Siblings?

Relationship to Cybersecurity

  • https://www.indusface.com/blog/ethical-hacking/
  • https://www.stationx.net/what-is-a-white-hat-hacker/
  • https://cyberquote.com/blog/know-your-hackers-white-hat-black-hat-grey-hat/
Just Copy Pasta

Resources

Got an idea?

Let the communication flow!

With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.

Got an idea?

Let the communication flow!

With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.

Got an idea?

Let the communication flow!

With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.

Got an idea?

Let the communication flow!

With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.

Got an idea?

Let the communication flow!

With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.

Got an idea?

Let the communication flow!

With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.

Got an idea?

Let the communication flow!

With Genially templates, you can include visual resources to wow your audience. You can also highlight a particular sentence or piece of information so that it sticks in your audience’s minds, or even embed external content to surprise them: Whatever you like! Do you need more reasons to create dynamic content? No problem! 90% of the information we assimilate is received through sight and, what’s more, we retain 42% more information when the content moves.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.

Show interactive elements